to the best of our ability since there are no guides for the newer OS versions. We are running the latest 5.9.0.3-117o.

We have WLAN bridged to X0 (LAN) and allowed all traffic from the WLAN to LAN in the firewall settings. I can confirm that if we change the wireless security to WPA-PSK it works perfectly and the Windows 7 machine has no issues connecting to the network. When we use WPA-EAP or any of the other EAP versions, there's zero communications to the 2003 server. The only thing that I can see is in the Sonicwall logs is one ID 518 with an authentication from our client to the SSID radio through the WLAN 802.11 management.

I can confirm that the VPN through RADIUS is working perfectly so it definitely is not an issue with the Sonicwall communicating with the server. We don't have any defined NAT policies other than the defaults right now but since it works with WPA-PSK I don't think it has anything to do with the NAT policies either.

Any suggestions or stories that this is indeed supported would be appreciated.

Like I mentioned above, that link is the exact same one we have followed. And as stated before, there's no IAS events on the server except from our HP wireless access points which are working perfectly with RADIUS and IAS.

If there's nothing in the system log the SonicWall/APs aren't trying to do RADIUS authentication or the RADIUS packet isn't getting to the IAS from the SonicWall/APs.

If packets were getting to the IAS but the configuration was wrong at the IAS you'd see something like "A RADIUS message was received from the invalid. RADIUS client IP address xxx.xxx.xxx.xxx" in the system log if the RADIUS client was unknown or misconfigured, or some other error if the configuration was bad at the IAS side.

With the GDPR deadline set for May 25, 2018, many organizations are ill-prepared due to uncertainty about the criteria for compliance. According to a recent WatchGuard survey, a staggering 37% of respondents don't even know if their organization needs to comply with GDPR. Do you?

Like I said earlier, Sonicwall VPN with RADIUS authentication works perfectly, I can see the IAS logs on our server along with the RADIUS tests done from the built in Sonicwall webpage.

It just looks like the client is connecting to the Sonicwall with authentication details and the Sonicwall is basically ignoring them and not passing them onto the RADIUS server. It would be nice to have some kind of descriptive log from either the server or Sonicwall but we get a generic Sonicwall log event for the ID 518 when the client sends the authentication to the Sonicwall.

So we know that the client is trying to connect to the Sonicwall wirelessly with WPA-EAP, we also know that it connects perfectly with WPA-PSK (therefore there is no firewall/NAT blocking), and we know the Sonicwall can communicate to the server through IAS RADIUS. It's just a piece missing in the middle.

It's totally relevant as it means that there's no firewall rules blocking traffic from the WLAN to LAN. If there were rules blocking traffic that would normally explain why there's no RADIUS requests hitting the RADIUS server.

I'll have to turn the Sonicwall back on to get the screenshots but we've checked it many times to compare it to the Sonicwall setup instructions.

The SonicWall will only forward RADIUS messages to/from the client and RADIUS server. If the client doesn't try to initiate a connection using the desired credentials/protocol you might not see anything in the log.

Well we spent half a day with a Sonicwall technician and they couldn't get it to work either but they wouldn't acknowledge it was a problem with their device/firmware either. They say that somehow our 1000+ fleet of Windows 7 Dell latitude laptops have problems with RADIUS authentication. I guess that since the laptops all work perfectly with EnGenius, Cisco and HP RADIUS wireless authentication that these vendors must be implementing non standard RADIUS protocols (insert rolling eyes here).

I guess it'll be back to using the HP wireless access points that work perfectly with any laptop. You just lost a bunch of business Sonicwall......

In this tutorial I will show you with short command examples how to obtain a packet footprint of all traffic flowing thru your Juniper device running ScreenOS. I do not know the exact firmware requirement, but I think the fprofile command is availab…

I found an issue or “bug” in the SonicOS platform (the firmware controlling SonicWALL security appliances) that has to do with renaming Default Service Objects, which then causes a portion of the system to become uncontrollable and unstable.
BACK…

Add bar graphs to Access queries using Unicode block characters. Graphs appear on every record in the color you want. Give life to numbers.
Hopes this gives you ideas on visualizing your data in new ways ~
Create a calculated field in a query:
…

Do you want to know how to make a graph with Microsoft Access? First, create a query with the data for the chart. Then make a blank form and add a chart control. This video also shows how to change what data is displayed on the graph as well as form…